Wrong Password Security & Risk Analysis

wordpress.org/plugins/alex-wrong-password

When someone gets a password wrong or uses the forgotten password form on your site, the administrator is emailed with the details that were entered.

10 active installs v9.0 PHP + WP 3.4.1+ Updated May 7, 2013
incorrectloginpasswordwp-loginwp-login-php
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Wrong Password Safe to Use in 2026?

Generally Safe

Score 85/100

Wrong Password has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "alex-wrong-password" v9.0 plugin exhibits a strong security posture in several key areas. It has a clean vulnerability history with no recorded CVEs, suggesting a consistent focus on security from the developers. The absence of dangerous functions, file operations, and external HTTP requests is also a positive sign. Crucially, all SQL queries are prepared, mitigating the risk of SQL injection. However, there are significant concerns raised by the static analysis. The complete lack of output escaping for all identified outputs is a critical weakness, potentially exposing the site to Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the taint analysis reveals two flows with unsanitized paths, which, although not classified as critical or high severity in this report, warrant investigation as they indicate potential pathways for attackers to inject malicious data. The absence of capability checks and nonce checks on any potential entry points, though the attack surface is reported as zero, leaves room for concern if future updates introduce such points without adequate protection.

Key Concerns

  • All outputs are unescaped
  • Taint analysis shows unsanitized paths
  • No capability checks present
  • No nonce checks present
Vulnerabilities
None known

Wrong Password Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Wrong Password Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

0% escaped2 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
the_admin_page (wrong-password.php:129)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Wrong Password Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_headwrong-password.php:17
filterwp_login_failedwrong-password.php:121
filterretrieve_passwordwrong-password.php:122
filterwp_loadedwrong-password.php:123
actionadmin_menuwrong-password.php:125
Maintenance & Trust

Wrong Password Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedMay 7, 2013
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Wrong Password Developer Profile

Anthony

6 plugins · 80 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Wrong Password

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
http://mrstats.strangebutfunny.net/statsscript.php

HTML / DOM Fingerprints

CSS Classes
wrap
FAQ

Frequently Asked Questions about Wrong Password